{"id":353,"date":"2021-03-18T16:14:00","date_gmt":"2021-03-18T16:14:00","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=353"},"modified":"2021-03-18T16:16:53","modified_gmt":"2021-03-18T16:16:53","slug":"global-mobile-secuirty-report","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/global-mobile-secuirty-report\/","title":{"rendered":"Global Mobile Secuirty Report"},"content":{"rendered":"\n<p>2020\u2019s events have precipitated the transition to remote working, strongly increasing workforces\u2019 reliance on mobile devices.<\/p>\n\n\n\n<p>As organizations\u2019 routines and security perimeters crumbled, cybercriminals saw in the chaos an opportunity to seize. In the last 12 months, cyberattacks have flourished all over the world, and targeting mobile devices to reach organizations\u2019 most sensitive data is now more commonplace than ever. <\/p>\n\n\n\n<p>Mobile applications are at the center of mobile usages, and unsurprisingly they have been keeping for years the position of favored vector to compromise smartphones and tablets, counting as the source of 76% of mobile attacks in 2020. However, their tricks are constantly changing to bypass organizations\u2019 security gates, making it complex to detect and neutralize them before they do harm. <\/p>\n\n\n\n<p><strong>CHANCES YOUR SMARTPHONE HOSTS A SPYWARE ARE HIGH<\/strong><\/p>\n\n\n\n<p>To run its services, a mobile application requires to access some information on the device hosting it, including some about its user. While most apps could properly work by only accessing and using these data locally, 65% of them are actually programmed to send the collected information to a remote location. This silent data exfiltration is often performed to monetize applications, and in this case, details are sold to marketing companies that profile users. The most leaked personal data are location details, contact lists, usages statistics and pictures, audio and video files.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\">AN OVERVIEW OF SOME ATTACK TECHNIQUES USED ON MOBILE<\/h6>\n\n\n\n<p><strong>Man-in-the-Middle \/ Network Sniffing<\/strong><\/p>\n\n\n\n<p>Adversaries may attempt to position themselves between two or more networked devices using a man-in-the-middle (MiTM) technique to support follow-on behaviors such as Network Sniffing or Transmitted Data Manipulation.<\/p>\n\n\n\n<p><strong>2FA Interception<\/strong><\/p>\n\n\n\n<p>Adversaries may target two-factor authentication mechanisms, such as smart cards, to gain access to credentials that can be used to access systems, services, and network resources.<\/p>\n\n\n\n<p><strong>Automated Exfiltration<\/strong><\/p>\n\n\n\n<p>Adversaries may exfiltrate data, such as sensitive documents, through the use of automated processing after being gathered during Collection.<\/p>\n\n\n\n<p><strong>Data Destruction<\/strong><\/p>\n\n\n\n<p>Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources.<\/p>\n\n\n\n<p><strong>Data Encrypted for Impact<\/strong><\/p>\n\n\n\n<p>Adversaries may encrypt data on target systems or on large numbers of systems in a network to interrupt availability to system and network resources. They can attempt to render stored data inaccessible by encrypting files or data on local and remote drives and withholding access to a decryption key.<\/p>\n\n\n\n<p><strong>Data Wipe<\/strong><\/p>\n\n\n\n<p>Adversaries may wipe or corrupt raw disk data on specific systems or in large numbers in a network to interrupt availability to system and network resources. With direct write access to a disk, adversaries may overwrite portions of disk data.<\/p>\n\n\n\n<p><strong>System Shutdown \/ Reboot<\/strong><\/p>\n\n\n\n<p>Adversaries may shutdown\/reboot systems to interrupt access to, or aid in the destruction of, those systems.<\/p>\n\n\n\n<p>Read Full Report <a href=\"https:\/\/www.pradeo.com\/media\/mobile-security-report-2021.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/p>\n\n\n\n<p>iTM covers all aspects of cybersecurity from Home cyber security managed solutions to automated, manage threat intelligence, forensic investigations, Cloud security best practice and cyber security training. Our objective is to support organisations and consumers at every step of their cyber maturity journey. <a href=\"https:\/\/www.itminister.co.uk\/contact.html\" target=\"_blank\" rel=\"noreferrer noopener\">Contact Us <\/a>for more information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>2020\u2019s events have precipitated the transition to remote working, strongly increasing workforces\u2019 reliance on mobile devices. As organizations\u2019 routines and security perimeters crumbled, cybercriminals saw in the chaos an opportunity to seize. In the last 12 months, cyberattacks have flourished all over the world, and targeting mobile devices to reach organizations\u2019 most sensitive data is &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/global-mobile-secuirty-report\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Global Mobile Secuirty Report&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[16,17,24,7,10],"tags":[],"class_list":["post-353","post","type-post","status-publish","format-standard","hentry","category-cyber-crime","category-cyber-risk","category-mobile-device-security","category-privacy","category-ransomware"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=353"}],"version-history":[{"count":3,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/353\/revisions"}],"predecessor-version":[{"id":356,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/353\/revisions\/356"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=353"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}